Securing Linux/Unix Workshop Course
The course is for beginners and system administrators, security analysts, technical staff and interested participants on Linux/Unix training. This training will teach students concepts of Linux security, which they can use for hardening their
1. Introduction to Security
a. Why study Linux Security?
b. What are we protecting against?
c. Remote exploits, Buffer
Overflows and more
2. Linux/Unix Hardening
a. OS Installation and Patching
b. Disable Vs. Patching
3. Securing Services
b. Specific Recommendations
c. inetd/xinetd management
d. Sendmail, Syslog and X Server
e. System Daemons
4. Remote Exploitation
a. Session Hijacking
b. Mitigation techniques
c. All about SSH
e. Managing Privileges
g. Host-based authentication
5. Host Based Firewalls
a. Filtering Network Access
b. Going Under
c. Digging the soil
e. Packets, packets and more
g. Logging and Iptables
h. Problems with FTP
6. Under/Linux Hardening
a. Hardening IP tables security
7. Physical Attacks & Defenses
a. Common attacks
b. Network/System tuning
c. Boot Loader and Password
8. Host Based Firewalls
a. Managing and automating rule
9. Logging Overview
a. System Auditing
b. Syslog configuration
c. Hint on reading logs for hacking
a. Centralize authentication
12. Tools, tips and more!
f. External access management
Regular rate: P20,000 + VAT without exam
Early bird rate: P19,250 + VAT without exam *
Group rate: P18,300 + VAT without exam **
Seats are limited so enroll now! See you there!
For registration concerns and clarifications feel free to contact:
Mobile: +639261069134 | Email: firstname.lastname@example.org
Head Office: Unit 1806 Tycoon Tower, Pearl Drive, Ortigas CBD, Pasig City
Managed Security Monitoring
Security Monitoring is the next “must-have” in security. Without monitoring your systems and their logs, you will not know if there is a problem or not. Pandora Security Labs’ Security Information and Event Manager (SIEM) is the heart of our managed security monitoring (MSM) service. Our SIEM is set to accept logs and events from our
clients, and then we process them to identify and any potential malicious activity. With our advanced correlation engine to correlate information from your diverse set of systems, we are able to detect new and evolving threats.
Behind the SIEM are certified security analysts who continually (24×7) monitor your network and systems to assure that you are always secure. In the event of an incident, our certified security analyst conducts standard incident handling procedures and informs the client of the best practice to prevent such incidents from happening.
With our MSM platform, we complement your IT department by being your incident response team (IRT). We’ll be the one who monitors every event in your network, and respond to any incident regardless of the time of the day. We provide you with rich and crucial reports such as compliance reports, incident reports, and event statistics
report that is readily available to you in your own Pandora SIEM Client Portal to help your IT administrator.
Vulnerability Assessment and Testing
Vulnerability assessment is an activity that identifies, ascertains and categorizes vulnerabilities in a computer, network, or communications infrastructure as a means to establish the appropriate controls required that can remove these vulnerabilities or to mitigate the impact should threats to these vulnerabilities be realized.
Vulnerability testing is the activity of testing the vulnerabilities identified if it could be exploited or not, in order to determine the exact exposure factor.
Education is the best way in attaining security in your organization as humans are always the weakest link in security. Pandora Security Labs provides introductory to advance classes, discussing dos/don’ts and best practices
when it comes to information security.
Managed Network Device Management
Managing your organization’s network devices or systems may be a complex matter. Pandora Security Labs’ certified network engineers are there to configure and manage your network device or systems to ensure proper configurations are placed, to minimize errors or misconfigurations. Each configuration are properly documented
and backed-up to ensure transparency and fault-tolerance.
IT Security Consulting
Either on-site or remotely, we can fill in the gaps for internal IT expertise so that you may focus on the business
strategies that provide profit to your business. Be it as an executive expert or a technical expert, Pandora Security
Labs will provide you with industry certified experts (Cisco, CompTIA, EC-Council, GIAC, ISC2, etc.) with the proper
skill sets and experience you need to manage your complex strategic projects and programs to extend your
Tips for Online Transactions
- Avoid scams by acting locally or paying with PayPal, Bank Deposit, LBC, or Pera Padala without the item.
- Never pay with anonymous payment services
- Don't buy or sell outside of your country. Don't accept cheques
- This site is never involved in any transaction, and does not handle payments, shipping, guarantee transactions, provide escrow services, or offer "buyer protection" or "seller certification"